微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

4.1 The intent of these principles and desired outcomes is to provide requirements and guidance for an effective and efficient system for (1) the acquisition of property, (2) the utilization of available property, and (3) the disposal of property. (40 U.S. Code § 101)4.2 Asset management practices shall seek, when viewed in totality, to be effective and efficient, to the point at which benefits exceed the costs of operation.4.3 The requirements and guidance in this practice shall be used to establish property management plans that strategically address organizational objectives including: scope, management system, management structure, process flows, alignment, internal controls, enforcement, risks, accountability, and resources to collectively realize optimal value from assets.4.4 The intent of this practice is to promote the right sizing and scope of the asset management activity to appropriately manage organizational assets.4.5 To establish a learning and innovative culture with continuous self-assessments and process improvements.4.6 To establish policies, systems, and processes to timely prevent, detect, and correct operational weaknesses and deficiencies in internal controls that may result in waste, fraud abuse, mismanagement, and corruption.1.1 This practice covers the creation of a set of guiding principles that, when adopted, is endorsed by top management to be applied to the practice of property management. These principles will enunciate the objectives and intent of the property (also known as “asset”) management community, stress simplified procedures, promote less rather than more, judgment rather than “by-the-book” decisions, and encourage the adoption of “best practices.”1.2 The acceptance of these guiding principles provides the high potential of improved internal controls and governance. It promotes a problem-solving mentality and culture within the property management community, encourages the use of innovative and cost-effective practices, creates greater commonality between government and industry practices, and increases the ability of organizations to respond to changing needs and business conditions.1.3 This practice adopts the concept that the potential benefits of operating in a manner consistent with a set of standards and guidelines outweigh concerns about the loss of predictability, uniformity, and consistency.1.4 This practice provides property management standards and guidance that may be used for various types of property including tangible, intangible, personal, and real.1.5 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety, health, and environmental practices and determine the applicability of regulatory limitations prior to use.1.6 This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.

定价: 590元 / 折扣价: 502 加购物车

在线阅读 收 藏

5.1 Data on the composition and characteristics of water are frequently used to evaluate the health and safety to humans and the environment.5.2 Moreover, such data are frequently used for process control or to ascertain compliance with regulatory statutes that place limits on acceptable compositions and characteristics of waters.5.3 Laboratories that conduct water sampling and generate analytical data, and those persons who have the responsibility for selecting a laboratory to perform water quality studies, need to use criteria, guidelines, and recommendations that have been developed by consensus and are well accepted in making this selection.5.4 Demonstration and documentation by a laboratory that there was judicious selection and control of organization, facilities, resources, and operations will enhance the credibility of the data produced and promote its acceptance.1.1 This guide provides information on consensus good laboratory practices for laboratories that provide services in the sampling and analysis of water. As consensus standards, these are the minimum criteria that all laboratories should consider in establishing their good laboratory practices. This guide may not be applicable to certain types of laboratories (e.g., microbilogical).1.2 This guide is designed to be used by those responsible for the selection, operation, or control of laboratory organizations engaged in sampling and analysis of water.1.3 This guide presents features of organization, facilities, resources, and operations which affect the usefulness of the data generated.1.4 This guide presents criteria for selection and control of the features described in 1.3 and also makes recommendations for the correction of unacceptable performance.1.5 This guide describes methodology and practices intended to be completely consistent with the International Organization for Standardization (ISO) 9000 series of standards and Guide 25 – 1990 (1). 21.6 The values stated in inch-pound units are to be regarded as the standard. The values given in parentheses are for information only.1.7 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.

定价: 0元 / 折扣价: 0

在线阅读 收 藏

定价: 918元 / 折扣价: 781 加购物车

在线阅读 收 藏
ASTM E2675-22 Standard Practice for Asset Management System Outcomes Active 发布日期 :  1970-01-01 实施日期 : 

定价: 646元 / 折扣价: 550 加购物车

在线阅读 收 藏
ASTM D7841-13 Standard Practice for Sustainable Laundry Best Management Practices (Withdrawn 2022) Withdrawn, No replacement 发布日期 :  1970-01-01 实施日期 : 

1.1 Purpose—The purpose of this practice is to identify and define sustainable laundry Best Management Practices (BMPs) that are used in commercial laundry facilities to reduce their impact on the environment.1.2 It is recommended that users rely on professional judgment informed by both environmental expertise and specific knowledge of the intended use of this practice. This practice provides instruction on interpretation of the data obtained. Interpretation of the data results in a determination of whether a laundry implements enough BMPs to be certified as complying with the requirements of this practice.1.3 The users of this practice include laundry professionals and inspectors who possess a broad understanding of environmental issues related to the operations and maintenance of laundry facilities.1.4 The values stated in SI units are to be regarded as standard. No other units of measurement are included in this standard.1.5 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.

定价: 0元 / 折扣价: 0

在线阅读 收 藏

定价: 515元 / 折扣价: 438 加购物车

在线阅读 收 藏

定价: 590元 / 折扣价: 502 加购物车

在线阅读 收 藏

This practice addresses quality assurance criteria for operation of a mechanical coal-sampling system in accordance with Practice D 7256/D 7256M, Practice D 2013, and Practice D 4916. It provides recommendations for performance monitoring, inspection, and maintenance, which are necessary in maintaining a sampling system’capability to consistently obtain a representative sample.1.1 This practice is applicable to cross-belt, falling-stream, and auger sampling systems.1.2 Spacing of increments pertains to the kind of interval between increments. Intervals can be defined in quantitative terms, such as units of time or mass, or in terms of position over the lot.1.2.1 Spacing of Increments for Cross-Belt and Falling-Stream Samplers—Cross-belt and falling-stream type mechanical sampling systems take increments based on time, either at fixed time intervals or at random times during a fixed time strata. Some falling-stream samplers can take increments based on equal mass of coal sampled as determined by scales. The sections of this practice that pertain to cross-belt and falling-stream samplers describe procedures for only time-based sampling systems. This time-based inspection guideline will satisfy most criteria for mass-based or combination mass-based and time-based sampling systems. If there are items that are not covered, the inspector should refer to the manufacturer's literature.1.2.2 Spacing of Increments for Auger Sampling—The spacing of increments collected by auger sampling systems is defined in terms of position over the lot.1.3 It is essential that the inspector have the documentation listed in Section 2 of this practice when conducting an inspection.1.4 The values stated in SI units are to be regarded as the standard. The values given in parentheses are for information only.1.5 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use. For a specific hazard statement, see Section 5.

定价: 0元 / 折扣价: 0

在线阅读 收 藏
ASTM E2595-07(2013) Standard Guide for Privilege Management Infrastructure (Withdrawn 2017) Withdrawn, No replacement 发布日期 :  1970-01-01 实施日期 : 

4.1 Motivation for the PMI comes from several organizational and application areas. For example:4.1.1 Supporting a distributed heterogeneous application architecture with a homogeneous distributed security infrastructure leveraged across the enterprise; providing user and service identities and propagation; and providing a common, consistent security authorization and access control infrastructure.4.1.2 Providing mechanisms to describe and enforce enterprise security policy systematically throughout the organization for consistency, maintenance, and ease of modification and to demonstrate compliance to applicable regulation and law.4.1.3 Providing support for distributed/service-oriented architectures in which enterprise-wide services and authoritative sources are protected by providing security services that themselves are also distributed using common interfaces and communication protocols.4.1.4 Providing “economies of scale” where it is desired to change the approach of individually managing the configuration of each point of enforcement to one that establishes a consolidated view of the safeguards in effect throughout the enterprise.4.1.5 Providing centralized control, management, and visibility to security policy across the enterprise and when connecting to other organizations. This allows for additional key features such as delegated administration, centralized policy analysis, and consolidated reporting.4.1.6 Providing a distributed computing security architecture allowing for synchronized security services that are efficiently maintained across the enterprise while also allowing for centralized policy control and distributed policy decision-making/enforcement. Ensuring proper security controls are enacted for each service and when used in combination.4.1.7 Provisioning incremental updates to policy and configuration data simultaneously across all distributed decision/enforcement points. Establishing and enforcing new policies not envisioned when individual applications were fielded and adapting to new requirements and threats. Managing identity and security implemented in a diverse mix of new and old technologies.4.1.8 Permitting an organization to grant, suspend, or revoke centrally any or all ability to connect to or access enterprise resources either individually or collectively and with the capability to enforce these policies at run-time.4.1.9 Supporting access decisions that are sensitive to a user’s credentials in addition to identity. For example, the user may have to be a licensed healthcare professional to access a medical record.4.1.10 Supporting Delegation—A user might delegate access for a resource to another user (for example, a physician might delegate access to his patient’s records to a specialist). This shows the need for a delegation capability for some applications.4.1.11 Supporting Sender Verification—When a user receives a signed document, he shall be sure the sender was, in some sense, authorized to sign and send the document. A simple example would be a prescription that shall be signed by a doctor. A simple identity certificate is insufficient, as it does not indicate the sender’s credentials (that is, that he is a doctor).4.1.12 Supporting Document Cosigning—Multiple examples exist in which more than one signature is required on a document (2). For example, a transcriptionist transcribes and signs a document, but it is not a valid part of the record until it is reviewed and signed by the primary care physician. Similar mechanisms can be used to provide cosignature controls when processing claims transactions. These types of applications require the ability to convey user authorizations (in assertions, credentials, authorization certificates, or possibly as extensions in identity certificates), to label documents and other objects with their security attributes (or to extract such attributes from the document), and to express authorization rules in machine-readable form.4.2 Existing standards, including ANSI X9.45, ISO 9594-8, IETFRFC 3280 X.509, OASIS SPML, SAML, WS-*, and XACML, define a number of mechanisms that can be used to construct a healthcare-specific PMI specification. This would include the following features:4.2.1 Privileges needed to access a target are conveyed in a claimant’s authorization credential. The claimant’s authorization credential may be an authorization certificate compliant with ISO 9594-8 (a particular form of attribute certificate) or a policy set description compliant with XACML or other referenced authorization standards.4.2.2 The sensitivity or other properties of the target being accessed may be held in a local database or in a signed data structure. This guide does not define a standard way to represent this information, since this is a local matter. It does provide guidance on how such information might be represented and manipulated using common mechanisms such as ASN.1 and XML. For a given target object, there may be multiple operations that may be performed; each such operation may have a different set of sensitivity attributes.4.2.3 The privilege policy may be held centrally, locally, or may be conveyed as a signed data structure. Different operations on a target may be subject to different privilege policies. This guide defines several standard policies, and applications may define additional policies.4.2.4 In the document authorization paradigm, cosignature requirements may be associated with a user or document, such that the signed document is considered authorized only if all necessary signatures are attached.4.2.5 Users may delegate privileges to other users.4.2.6 Users may be assigned to roles that convey permissions.4.2.7 Some authorizations may be sufficiently dynamic that it is not feasible to place them in an enterprise authorization infrastructure (that is, the cost of maintenance is too high given the short lifetime or rapid frequency of change of the privileges or constraints). Such authorizations may be kept in a local authorization server’s database and accessed as environmental variables.4.3 The remaining sections of this guide discuss mechanisms to convey privilege, sensitivity, and policy information in a distributed PMI.1.1 This guide defines interoperable mechanisms to manage privileges in a distributed environment. This guide is oriented towards support of a distributed or service-oriented architecture (SOA) in which security services are themselves distributed and applications are consumers of distributed services.1.2 This guide incorporates privilege management mechanisms alluded to in a number of existing standards (for example, Guide E1986 and Specification E2084). The privilege mechanisms in this guide support policy-based access control (including role-, entity-, and contextual-based access control) including the application of policy constraints, patient-requested restrictions, and delegation. Finally, this guide supports hierarchical, enterprise-wide privilege management.1.3 The mechanisms defined in this guide may be used to support a privilege management infrastructure (PMI) using existing public key infrastructure (PKI) technology.1.4 This guide does not specifically support mechanisms based on secret-key cryptography. Mechanisms involving privilege credentials are specified in ISO 9594-8:2000 (attribute certificates) and Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) (attribute assertions); however, this guide does not mandate or assume the use of such standards.1.5 Many current systems require only local privilege management functionality (on a single computer system). Such systems frequently use proprietary mechanisms. This guide does not address this type of functionality; rather, it addresses an environment in which privileges and capabilities (authorizations) shall be managed between computer systems across the enterprise and with business partners.1.6 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.

定价: 0元 / 折扣价: 0

在线阅读 收 藏

定价: 590元 / 折扣价: 502 加购物车

在线阅读 收 藏
ASTM E2675-22 Standard Practice for Asset Management System Outcomes Active 发布日期 :  1970-01-01 实施日期 : 

4.1 This practice establishes expected outcomes associated with an asset management system.4.2 Understand the difference between performance standards and design standards—these are primarily performance statements versus design statements. What is being measured is achievement, not process.4.3 This practice encourages an inclusive understanding and communication of the outcomes associated with an asset management system. As additional standards are added, comparisons on this basis to other asset management systems can be further enabled.4.4 This practice, in combination with Practice E2279, should provide an enhanced basis for making decisions surrounding both assets and asset management systems.4.5 This practice is intended to foster and enable additional standard practices related to or based on the terms and concepts in the outcomes and outcome components. In particular, this practice may suggest a standard for personal and management skills useful in efforts to achieve these outcomes.4.6 This practice is to evaluate how robust the asset management system is, and guide future corrections and improvements.1.1 This practice describes expected outcomes associated with an asset management system. It is a measure of achievement rather than process and is performance oriented rather than design oriented.1.2 Outcomes are defined as information, events, objects, or states of being produced as a result or consequence of an objective, plan, process, accident, effort, or other similar action or occurrence and can be expressed in a quantitative or qualitative manner.1.3 An output measure is the tabulation, calculation, or recording of activity or effort and can be expressed in a quantitative or qualitative manner. For example, an output is driving 100 mph; an outcome is arriving safely.1.4 An outcome measure is an assessment of the results of a program activity compared to its intended purpose. This practice assumes that inputs are correlated to known or declared outputs of the system or system component being assessed.1.5 Consistent with Practice E2452 (EMPM), these outcomes are grouped into process management outcomes and operational outcomes.1.5.1 Although they may be directly related, strategies and tactics should not be confused with outcomes. Strategies are long-term plans of action designed to achieve a particular goal. Tactics are maneuvers or actions calculated to achieve some end. For example, increasing exercise is a strategy to attain the goal or outcome of fitness. Running is a supporting tactic to achieve the goal or outcome of fitness. Other tactics or groups of tactics may achieve the same outcome. On the other hand, as the definition of outcome indicates, tactics are not required for attaining outcomes. For example, fitness may be an unplanned result of a job requiring physical exertion.1.6 This practice describes the outcomes at a high level, with limited discussion of each outcome or components of each outcome. The intent is to provide a framework for current and potential additional standards. A cross reference relating current standards to the outcomes is provided in Section 5.1.7 The outcomes further described in Section 5 are listed in the following:1.7.1 Process Management Outcomes: 1.7.1.1 Outcome 1—Mission Support1.7.1.2 Outcome 2—Accounting and Accountability1.7.1.3 Outcome 3—Information Management1.7.1.4 Outcome 4—Planning1.7.1.5 Outcome 5—Relationships1.7.2 Operational Outcomes: 1.7.2.1 Outcome 6—Asset Functionality for Intended Purpose1.7.2.2 Outcome 7—Resource Optimization1.7.2.3 Outcome 8—Asset Visibility1.7.2.4 Outcome 9—Safety and Security1.7.2.5 Outcome 10—Installation, Movement, and Storage1.8 In Section 5, a rating scale is provided to quantify in a uniform manner achievement of outcomes and outcome components.1.9 This practice, in combination with Practice E2279, clarifies and enables effective and efficient control and tracking of assets and may provide an enhanced basis for making decisions surrounding both property and property management systems.1.10 This practice is intended to be applicable and appropriate for all asset-holding entities.1.11 This practice covers tangible assets and tangible property as defined in Terminology E2135. Consistent with the nomenclature used, individual portions of the practice may be applicable to more limited subsets of tangible assets, for example, to equipment and not to material.1.12 This practice assumes competence and subject matter expertise of those performing the assessment and those being assessed. (For example, as specified in the GAO Yellow Book.) The use of professional judgment by asset management professionals is required to achieve desired outcomes.1.13 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety, health, and environmental practices and determine the applicability of regulatory limitations prior to use.1.14 This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.

定价: 646元 / 折扣价: 550 加购物车

在线阅读 收 藏

4.1 This practice can be used to facilitate comparison of areas that have been measured but it does not specify what measurements must be conducted.4.2 This practice can be used in space programming and forecasting of space requirements.4.3 This practice can be used to classify areas for internal cost accounting purposes.4.4 This practice can be used to compare space use between organizations.1.1 This practice provides a definitive procedure for measuring and classifying floor area in buildings for use in facility management, specifying occupant requirements, space planning, and for strategic facility planning.1.2 This practice specifies the sequence in which to measure floor area.1.3 This practice is applicable to owned, rented, and leased buildings.1.4 Use Annex A1 to measure floor area in office facilities. The measurement practice in Annex A1 may also be suitable for use in other functional types of building which include offices, such as research, laboratory, or manufacturing buildings and building-related facilities.1.5 The practice in Annex A1 is not intended for use in lease negotiations with owners of commercial office buildings or related properties. For that purpose, refer to the American National Standard published by the American National Standards Institute under the designation ANSI/BOMA Z65.1–1996 and commonly known as the ANSI-BOMA standard.1.6 This practice is not intended for and not suitable for use for regulatory purposes, fire hazard assessment, and fire risk assessment.1.7 This practice was developed for use within North America and includes some rules comparable to ISO 9836 Performance Standards in Building—Definition and Calculation of Area and Space Indicators.1.8 The values stated in either SI units or inch-pound units are to be regarded separately as standard. The values stated in each system may not be exact equivalents; therefore, each system shall be used independently of the other. Combining values from the two systems may result in non-conformance with the standard.1.9 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.

定价: 646元 / 折扣价: 550 加购物车

在线阅读 收 藏
131 条记录,每页 15 条,当前第 5 / 9 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页